Open in app

Sign In

Write

Sign In

0xSage
0xSage

1.2K Followers

Home

About

Published in Year of Zero Knowledge

·May 22, 2022

Rust Guide: Sum-Check protocol

This is an unofficial & unaudited Rust implementation of algorithms in Dr. Thaler’s Proofs, Arguments, & ZK book. — This week we learned about the sum-check protocol. In cases when we want a sum of a polynomial g over an exponential size domain, in this case 2^v (a boolean hypercube), sum-check provides an interactive proof for Provers to claim such sums. Rather than manually recomputing this sum, the Verifier…

Blockchain

4 min read

Rust Guide: Sum-Check protocol
Rust Guide: Sum-Check protocol
Blockchain

4 min read


Published in Year of Zero Knowledge

·May 15, 2022

Rust Guide: Evaluating multilinear extensions via Lagrange interpolation

This is an unofficial & unaudited Rust implementation of algorithms in Dr. Thaler’s Proofs, Arguments, & ZK book. — This week we learned why multilinear extensions are useful for interactive proofs. In short, and in egregious laymen terms, multilinear extensions give us the ability to both (1) distance amplify a polynomial f , into f~, which can be evaluated by the Verifier and (2) still keep the new f~…

Zeroknowledge

3 min read

Rust Guide: Evaluating multilinear extensions via Lagrange interpolation
Rust Guide: Evaluating multilinear extensions via Lagrange interpolation
Zeroknowledge

3 min read


Published in Coinmonks

·Feb 24, 2020

Introduction to Cryptography: One time pads and stream ciphers

Part 1 of an 8-week explainer series based on Dan Boneh’s Crypto I — I hope this serves as a practical, easy-to-understand guide for crypto enthusiasts who want a stronger understanding of ciphers, encryption, number theory, and public-key encryption methods. No coding/math skills required. This week we cover: Basic symmetric ciphers: OTPs, stream ciphers Security definitions: perfect secrecy, semantic security

Cryptography

7 min read

Introduction to Cryptography: One time pads and stream ciphers
Introduction to Cryptography: One time pads and stream ciphers
Cryptography

7 min read


Published in HackerNoon.com

·Jun 17, 2019

Simply Explained: Blockchain Scalability Solutions — Past, Present, and Future

And how Polkadot & Substrate fits into this ecosystem — I recently gave a talk at Cogx about how blockchains scale. Where, we also discoursed how Polkadot fits into a future ecosystem where many blockchains are operating at scale. In the same vein, this post relays: A brief history of blockchain scaling solutions Polkadot & Substrate’s role in this ecosystem …

Blockchain

9 min read

Simply explained: Blockchain scalability solutions past, present, and future
Simply explained: Blockchain scalability solutions past, present, and future
Blockchain

9 min read


Published in Good Audience

·Apr 9, 2019

Understanding Zero-knowledge proofs through illustrated examples

This is a somewhat illustrated guide to Zero Knowledge — I recently listened to this ZKFM podcast, which gave practical examples that clearly explained key concepts in zero knowledge. I felt inspired to transcribe them here. In cryptography, zero knowledge proofs let you convince me that you know something, or have done something, without revealing to me what your secret…

Blockchain

7 min read

Understanding Zero-knowledge proofs through simple examples
Understanding Zero-knowledge proofs through simple examples
Blockchain

7 min read


Published in HackerNoon.com

·Nov 5, 2018

Introducing Solidity Koans

Learn Ethereum programming by making tests pass — As inspired by Ruby Koans, Solidity Koans guides you through simple, bite-sized programming exercises to learn Solidity the gentle way. The goal is to learn the Solidity language, syntax, structure, and how to create secure and gas-efficient smart contracts. …

Ethereum

3 min read

Introducing Solidity Koans
Introducing Solidity Koans
Ethereum

3 min read


Published in Coinmonks

·Sep 17, 2018

Ethernaut Lvl 18 Recovery Walkthrough: How to retrieve lost contract addresses (in 2 ways)

This is a in-depth series around Zeppelin team’s smart contract security puzzles. I’ll give you the direct resources and key concepts you’ll need to solve the puzzles 100% on your own. — This levels requires you to retrieve a lost contract address to regain the remaining 0.5 ethers. It’s a common flub for Solidity developers to lose a newly created contract address. This becomes frustrating, especially if you also lose the transaction receipt and other means of retracing your steps.

Ethereum

4 min read

Ethernaut Lvl 18 Recovery Walkthrough: How to retrieve lost contract addresses (in 2 ways)
Ethernaut Lvl 18 Recovery Walkthrough: How to retrieve lost contract addresses (in 2 ways)
Ethereum

4 min read


Published in Coinmonks

·Sep 17, 2018

Ethernaut Lvl 17 Locked Walkthrough: How to properly use (and abuse) structs in Solidity

This is a in-depth series around Zeppelin team’s smart contract security puzzles. I’ll give you the direct resources and key concepts you’ll need to solve the puzzles 100% on your own. — This levels requires you to unlock a registrar by abusing a poorly initiated struct. Best practices when using Structs Like in object oriented programming, you can create composite datatypes via structs. Structs can contain functions and other complex datatypes like mappings and arrays. These arrays and mappings can even contain more structs. …

Programming

4 min read

Ethernaut Lvl 17 Locked Walkthrough: How to properly use (and abuse) structs in Solidity
Ethernaut Lvl 17 Locked Walkthrough: How to properly use (and abuse) structs in Solidity
Programming

4 min read


Published in Coinmonks

·Sep 17, 2018

Ethernaut Lvl 16 Preservation Walkthrough: How to inject malicious contracts with delegatecall

This is a in-depth series around Zeppelin team’s smart contract security puzzles. I’ll give you the direct resources and key concepts you’ll need to solve the puzzles 100% on your own. — This levels requires you to combine knowledge from levels 6 and 12 to claim ownership of the contract. Refresher on delegatecall Recall from level 6: Delegate call is a special, low level function call intended to invoke functions from another, often library, contract.

Ethereum

4 min read

Ethernaut Lvl 16 Preservation Walkthrough: How to inject malicious contracts with delegatecall
Ethernaut Lvl 16 Preservation Walkthrough: How to inject malicious contracts with delegatecall
Ethereum

4 min read


Published in Coinmonks

·Sep 15, 2018

Ethernaut Lvl 15 Naught Coin Walkthrough: How to abuse ERC20 tokens and bad ICOs

This is a in-depth series around Zeppelin team’s smart contract security puzzles. We learn key Solidity concepts to solve the puzzles 100% on your own. — This levels requires you to abuse a bad ERC20 implementation and control the NaughtCoin token. What is ERC20 ERCs (Ethereum Request for Comment) are protocols that allow you to create tokens on the blockchain. ERC20, specifically, is a contract interface that defines standard ownership and transaction rules around tokens.

Ethereum

4 min read

Ethernaut Lvl 15 Naught Coin Walkthrough: How to abuse ERC20 tokens and bad ICOs
Ethernaut Lvl 15 Naught Coin Walkthrough: How to abuse ERC20 tokens and bad ICOs
Ethereum

4 min read

0xSage

0xSage

1.2K Followers

Engineer. Tweets @0xSage

Following
  • James Garside

    James Garside

  • Julie Zhuo

    Julie Zhuo

  • Gaurav Agrawal

    Gaurav Agrawal

  • Stefan Kojouharov

    Stefan Kojouharov

  • Polynya

    Polynya

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech